Ransomware Basics: A Checklist

Aug 17, 2016 | Security-GRC | 0 comments

Most Ransomware is introduced into an enterprise through the web and email, but it’s getting even more sophisticated.

No longer must you download an obvious file and run it. These days, you don’t even need to click in order to be infected.

However, most malware can be stopped by simply getting back to basics. We’ve put together a checklist that you can do today to help protect you right away. While this list won’t cover all scenarios, it’s a good place to start.

More and more of our clients are turning to a more pro-active approach in hunting Malware.

Many enterprises used a reimaging strategy, but that comes at a cost of lost work for those impacted, time spent from the IT staff and productivity for all involved during the remediation. If multiple users are impacted at the same time or if frequency increases, the math starts to work against reimaging.

If you’re interested in learning about more advanced steps to take, tools that can help or a strategy to help prevent the spread of malware or ransomware throughout an enterprise, give us a call and we can help you explore options and weigh your costs and risk level.

View/Add comments

<script type="text/javascript" src="//platform.linkedin.com/in.js"></script><script type="in/share" data-counter="top"></script> <a href="https://twitter.com/share" class="twitter-share-button" data-via="ASMGi_CLE">Tweet</a> <script>!function(d,s,id){var js,fjs=d.getElementsByTagName(s)[0],p=/^https:/.test(d.location)?'http':'https';if(!d.getElementById(id)){js=d.createElement(s);js.id=id;js.src=p+'://platform.twitter.com/widgets.js';fjs.parentNode.insertBefore(js,fjs);}}(document, 'script', 'twitter-wjs');</script>

Navigate the blog